Sciweavers

1737 search results - page 343 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
HICSS
2007
IEEE
122views Biometrics» more  HICSS 2007»
14 years 3 months ago
Enterprise Information Architecture (EIA): Assessment of Current Practices in Malaysian Organizations
In this paper we described the findings based on a research study on current Enterprise Information Architecture (EIA) practices in Malaysian organizations. Ten organizations from...
Rafidah Abd. Razak, Zulkhairi Md. Dahalin, Rohaya ...
WIOPT
2005
IEEE
14 years 2 months ago
A New Hybrid Scheduling Framework for Asymmetric Wireless Environments with Request Repetition
Abstract— The ever-increasing popularity of web services, growing demand for wireless multimedia and introduction of new, feature-enhanced, hand-held devices has already given bi...
Navrati Saxena, Maria Cristina Pinotti, Kalyan Bas...
BTW
2005
Springer
113views Database» more  BTW 2005»
14 years 2 months ago
A Learning Optimizer for a Federated Database Management System
: Optimizers in modern DBMSs utilize a cost model to choose an efficient query execution plan (QEP) among all possible ones for a given query. The accuracy of the cost estimates de...
Stephan Ewen, Michael Ortega-Binderberger, Volker ...
BMCBI
2011
13 years 4 months ago
Motif-guided sparse decomposition of gene expression data for regulatory module identification
Background: Genes work coordinately as gene modules or gene networks. Various computational approaches have been proposed to find gene modules based on gene expression data; for e...
Ting Gong, Jianhua Xuan, Li Chen, Rebecca B. Riggi...
ICDCS
2008
IEEE
14 years 3 months ago
Toward Predictive Failure Management for Distributed Stream Processing Systems
Distributed stream processing systems (DSPSs) have many important applications such as sensor data analysis, network security, and business intelligence. Failure management is ess...
Xiaohui Gu, Spiros Papadimitriou, Philip S. Yu, Sh...